An application programming interface (API) is: Group of answer choices the code the application software needs in order to interact with the CPU the currently active part of an application all other answers are incorrect the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM

Answers

Answer 1

Answer:

The code the application software needs in order to interact with the CPU

Explanation:


Related Questions

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do

Answers

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

The ________ is the easy way to insert a new slide between existing slides.

Answers

What is the subject about?

what do you mean by HDML coding ​

Answers

Answer:

hdml coding is a standard markup language for documents designed to be displayed in a web browser.

Explanation:

it can be assisted using things like CSS or JS

difference between vacuum tube and transistor​

Answers

Answer:

I HOPE THE ABOVE INFORMATION WILL HELP YOU A LOT.

IblMessage.txt=welcome to fiji.what is the error in the coding and what type of error is it?(explain)​

Answers

Answer:

The correct syntax (assuming WinForms) is

lblMessage.Text = "Welcome to fiji";

The given statement fails to follow the syntax of literal strings, which should be in quotation marks. (depending on the framework and programming language, the txt property may also be incorrect, as well as the missing semi-colon).

i will mark brainalist! ​

Answers

Answer:

I would say

1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Answer:

i think it would be 1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Explanation:

You have a scenario where you need to disable the guest network on your wireless router. You try to log in, but your password does not work. After several attempts, you realize that you forgot your password. What can you do?

Answers

Answer:

Reset the router by holding down the reset button for 30 seconds. The reset button can be located in the back or bottom area of the router. The function of the reset button is to turn restore the wireless router to default factory setting such that customized settings including the DNS, the static IP address setup, stored personal passwords DHCP parameter settings port forwarding and routing settings are erased.

Explanation:

The head of small organization wants to install a network so that all the employees of different department can share various resources: I. What type of network he/she needs to set up in the organization? II. Name the resource that the employees will be able to share after setting up the network. ​

Answers

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

i need a computer science help.....and I rlly want it right now...this the question
calculate all multiples of 5 that are less than a randomly generated number between 12 and 45. for example the random number is 16. the output is then 5,10,15 python

so basically if type a number between 12 and 45 it shud give me all the multiples of 5 less than the number i typed......pls help;-;

Answers

Define, en tus propias palabras, lo que son los sistemas de información.

Help me why did my desktop erase every app I need that please

Answers

Answer:

Your computer is affected by a polymorphic or trojan horse virus, so install avast antivirus. Set your computer into safe mode, then open the antivirus

Answer:

your pc has virus

Explanation:

What are the parts to an
email?

A)Recipient, Greeting, Body, Closing
B)Recipient, Subject, Body, Signature
C)Recipient, Subject, Greeting, Body, Closing, Signature
D)None of the above

Answers

Answer:

B) recipient subject body signature

What tends to happen to the accuracy of our savings goals as our investment horizon becomes longer? A. It is not useful to have long-term savings goals. B. We are less able to accurately estimate the amount we will need. C. We can estimate the amount we need more accurately. D. The accuracy of our savings goals doesn't change.

Answers

Answer:

The answer is "Option B".

Explanation:

The Secured Goals are a part of your account, which is configured to just save your cash and also save it, and all the differences are good dividend savings accounts to shield this from accidental expenses. While opening the protected savings fund, the saving goal would be automatically created or loan rates invested only at the end of each month, that's why in this question "option B" is correct.

The less able to the accurate estimate of the amount we will require. Thus the option B is correct.

What is the saving goals of investment?

The saving or the secured Goal is a part of the account, it tells how to adjust and configure your save. When opening the protected saving fund the dating goal would be automatically to create the loan and rate the investment at the end of the month. Thus we can accurately estimate the amount we need.

Find out more information about the saving goals.

brainly.com/question/6903609

write a python program to calculate the compound interest

Answers

Answer:

initialPrincipal = float(input("Please enter your initial principal:"))

interestRate = float(input("Please enter your interest rate:"))

timePeriod = float(input("Please enter your number of times interest applied per time period:"))

elapsedPeriod = float(input("Please enter your number of time period elapsed:"))

finalAmount = initialPrincipal*(1 + interestRate/timePeriod)^(timePeriod*elapsedPeriod)

print("Your final amount would be:", finalAmount)

General purpose computer can perform a single task, true or false​

Answers

Answer:

This is false.

Explanation:

General-purpose computers are desktop computers or laptops that can function in multiple ways. A special-purpose computer is usually designed to do one thing only.

Payroll deductions are the same for all employees. True False

Answers

Answer:

The answer is "False".

Explanation:

The Payroll deductions are the amount of each pay period, that is paid out of the paycheck of the employee. It is also considered as the money, which is deducted from its employees' paychecks so, if paid by the employers.

All staff members are not identical. Workers' paychecks determine the amount individuals receive during each pay cycle. It also is referred to it as payroll retainers.

List out analog computer​

Answers

Answer:

1. Wall clocks.

2. Analog watches

3. Measuring instruments with callibration

Explanation:

whats the recommended amount of dedodated wam
i can have in a server

Answers

Hi! The recommended amount of RAM that you should have is 6gb and above.

in object oriented programming what is a constructor?

a. the attributes that allow a programmer to imagine a new object
b. the behaviors that allow a programmer to design a new object
c. the code that allows a programmer to create a new object
d. the template that allows a programmer to modify a new object

Answers

Answer:

The answer is A.

Answer:

A. the attributes that allow a programmer to imagine a new object

Explanation:

Got the answer right on the test!

Assume that strike Counter has already been declared to be a "pointer to int". Assume further that strike Counter has been initialized -- its value is the address of some int variable. Write a statement that adds 22 to the value of the variable that strikeCounter is pointing to.

Answers

Answer:

The statement to this question can be defined as follows:

*strike_Counter =*strike_Counter +22;//adds  value 22 in *strike_Counter

Explanation:

In the given question, it is already defined, that "strike_Counter" is an integer pointer variable, which means, it only holds the integer value in its address memory.

In the next step, it is defined, that it adds the value "22" in its variable, and for this, we declare the statement in the answer section, which adds the value.  

for example, if in the "strike_Counter" variable holds the integer value, that is 5 and after adding the 22 it will become 27.    

define analogue computer with any four features​

Answers

Answer:

hope it helps you

Explanation:

and pls mark as brainlist ans

NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, employ authentication mechanisms, and offer subscribers sufficient visibility about mechanisms used to protect subscribers from other subscribers and the provider.a) trueb) false

Answers

Answer:

The answer is "Option a".

Explanation:

In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.  

Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.

A team of architects is designing a new AWS environment for a company which wants to migrate to the Cloud. The architects are considering the use of EC2 instances with instance store volumes. The architects realize that the data on the instance store volumes are ephemeral. Which action will not cause the data to be deleted on an instance store volume

Answers

Answer:reboot

Explanation:

What do computer programs generally try to solve and how? A) Computer programs generally try to solve a well-defined problem using a well-defined algorithm B) Computer programs try to solve poorly-defined problems using well-defined algorithms C) Computer programs try to solve well-defined problems using poorly-defined algorithms D) Computer programs try to solve math problems using only plain English

Answers

Explanation:

A) computer programs generally try to solve hard problems in a few seconds and makes us easy to learn

A company runs an application on a fleet of EC2 instances. The company wants to automate the traditional maintenance job of running timely assessments and checking for OS vulnerabilities. As a Cloud Practitioner, which service will you suggest for this use case

Answers

Answer:

AWS Systems Manager

Explanation:

AWS Systems Manager (https://aws.amazon.com/systems-manager/features/) is the service that allows to centralize operational data from multiple AWS services and automate tasks across AWS resources.

Select the correct answer. In which area is composing for games similar to composing for movies?
A. royalties earned
B. success of song-based soundtracks
C. usage of audio software for mixing and editing
D. spotting sessions

Answers

I believe the answer is c, hope this helps

Answer:

c

Explanation:

cuz im jus right

What type of camera is a cell phone camera? A.) DSLR B.) manual C.) compact D.) zoom

Answers

Answer:

The correct option is;

D.) Zoom

Explanation:

The six types of camera found on smart phones includes the monochrome, macro camera, ultra-wide camera, periscope zoom camera, the main phone camera, and the depth sensor camera

The zoom cameras on smart phones can be found mainly in the top range models of smart phones due to the costs of the camera components including the sensor.

Smart phones also have digital zooming that make use of the high mega pixels that come with the phone.

solve plz
Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use?

JavaScript
HTML
CSS
Text editor

Answers

Answer:

HTML

Explanation:

HTML is used is making web pages.

Answer:

what

Explanation:

Chris needs to create a simple web page with HTML. Which tool will he use? HyperText Web browser Text editor Operating software WILL GIVE 100 AND BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!1

Answers

Answer:

The answer is "Text editor".

Explanation:

It is a computer program, which is used to provide editing on the plain text, and for this editing, we use a text editor. This tool differs from word processors software because it doesn't add additional text editing metals. In this tool, we also write the HTML code, and the incorrect choice can be defined as follows:

HyperText is a wrong choice because in these two or more pages are linked and it is used to move from one page to another. The Web browser is also a wrong choice because it is used to display the design of the web page. Operating software is also a wrong choice because it system software in which all things are done.  

Answer:

text editor

Explanation:

Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT

Answers

USB is the answer because that is the adapter to plug it in

how to print the output of "WELCOME" by using python codes with arrays.

Answers

Answer:

Following are the code to this question:

arr=['WELCOME']#defining list arr and assign string value

print (str(arr)[2:-2])#use print method that uses slicing to remove bracket and quotes

Output:

WELCOME

Explanation:

The Array data type is used to store the same type of value, but in python, the array is not used, instead of using an array we use the list, that stores multiple data types.

In the above code "arr", that is list is declared, that store a string value.    

To print its value, we use the print method, inside this, we use slicing to remove brackets and quotes.

Other Questions
The perimeter of a scalene triangle is 14.5 cm. The longest side is twice that of the shortest side. Which equation can be used to find the side lengths if the longest side measures 6.2 cm? Part II - Read "Living in Harmony with Nature" and answer the following question in a completesentence.1. In what ways did early settlers affect the ecosystem of North America? The table below gives the list price and the number of bids received for five randomly selected Items sold through online auctions. Using this data, consider the equation of the regression line hat y =b 0 +b 1 x for predicting the number of bids an item will receive based on the list price. Keep in mind, the correlation coefficient may or may not be statistically significant for the data givenRemember, practice , it would not be appropriate to use the regression line to make a prediction the correlation coefficient is not statistically significant Price in Dollars 39 40 42 43 45 Number of Bids 1 3 5 6 8 Table Copy Data Step 1 of 6: Find the estimated slope: Round your answer to three decimal places Given the following venn diagram, choose the correct set for M help me plz can somewon help me Producers of vital registration Which of the following is a benefit of restoration justice, which the judge might have felt was valuable in Justin case? wants to use the capital retention approach to determine how much life insurance to purchase. Robert would like to provide $35,000 per year to his family, forever, if he dies. The assets he owns today will provide $25,000 in annual income without the liquidation of these assets. If life insurance proceeds can be invested to earn a 5 percent annual return, how much life insurance should Robert purchase (if any) to fund the additional income needed to meet his $35,000 annual income goal Find the discount and the selling price, when:(ii) the printed price =12750, discount= 25/3% A very early Egyptian relic called the___ depicts a victory in war by upper Egypt over lower egypt Solve the equation 3(2x + 2) = 3x 15. It's a long question but how can I be confident,powerful,assertive,extrovert and bold An ice cream store makes 144 quarts of ice cream in 8 hours. How many quarts could be made in 12 hours? The diagram summarizes the light-dependent reactions of photosynthesis. A diagram shows the light-dependent reactions of photosynthesis. x goes to the light dependent reaction. The light dependent reaction goes to chemical energy and oxygen. What is the input of the light-dependent reactions, labeled X? CO2, H2O, O2, and light CO2, H2O, and light CO2 and H2O H2O and light (Algebra) HELP ME ASAP PLZ You see Bonnie rock climbing El Capitan. On your telescope is a clinometer. The angleof elevation is 20 degrees. You know you are standing 950 feet away from El Capitan.How high up is Bonnie? Divide. Write your answer as a fraction in simplest form. 1/520= when did the fear of communism known as the red scare began in the united states? A. During world war II B. During the Great Depression C. Following world war I D. After the cold war ended. what is the area of triengle if b=6cm and h=4 cm. please explain it and do all the process A 25g rock is rolling at a speed of 5 m/s. What is the kinetic energy of the rock?